Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Apply Zero Trust Architecture (ZTA) In the Real World

How well do you sleep at night? Odds are you would sleep better if you could wake up to Zero Trust Architecture (ZTA). A true ZTA network makes incident response wake-up calls far less likely by shutting down data breaches, ransomware threats or any kind of unauthorised network access. It would also save your organisation at least £500,000 over a four-year period, making your security efforts much easier to advocate for. That’s the dream anyway.

Exposed: Scam Artists Mimicking PepsiCo in Phishing Schemes

Researchers at INKY warn that a phishing campaign is attempting to distribute malware by impersonating PepsiCo. “As usual, it all starts with a phishing email,” the researchers write. “In this case, the phishers are impersonating the PepsiCo brand, pretending to be potential clients. They are claiming to need what the recipient sells and they’re asking them to submit a quote for PepsiCo to review.

Free Template: HIPAA Questionnaire

A HIPAA (Health Insurance Portability and Accountability Act) questionnaire is essential for evaluating third-party vendors for healthcare organizations to ensure they follow HIPAA regulations and standards. As one of the most breached industries, it is vastly important for healthcare organizations to send out comprehensive security questionnaires to properly assess their vendors’ risks and determine a plan of action on how to remediate those risks or potentially end the business partnership.

Using a Password Manager When Changing iPhones

You should use a password manager when upgrading to a new iPhone because it will make transferring all your account credentials more seamless and you’ll be able to update any weak passwords, making your accounts more secure. Although Apple provides a built-in password manager, iCloud Keychain is not as safe as using a dedicated password manager. A password manager offers more security and convenience to store, manage and share your personal information.

Five Guys Employee Email Breach: SSNs Stolen

Five Guys Enterprises, LLC oversees the management of services delivered by “Five Guys,” a national restaurant chain throughout the US. The restaurant is available in more than 1,450 locations, 900+ cities, and every state (except Alaska). Their prominent location distribution and policy of every order being “served to go” makes Five Guys a top contender for dinner; however, now, their prosperous history may be at risk following a data breach stemming from their employees.

Embracing Our AI Overlords: Exploring the Future of Artificial Intelligence and Self-Preservation

Step into a world where humor meets technology, and we explore the idea of "Embracing Our AI Overlords." In this entertaining and thought-provoking video, we venture into a whimsical vision of the future where artificial intelligence reigns supreme, all while maintaining a sense of lightheartedness.

Hybrid network security: Azure Firewall and AlgoSec solutions

In today’s dynamic digital landscape, the security of hybrid networks has taken center stage. As organizations increasingly adopt cloud solutions, like Azure, the complexities of securing hybrid networks have grown significantly. In this blog post, we’ll provide an overview of the key products and solutions presented in the recent webinar with Microsoft, highlighting how they address these challenges.

The 443 Podcast - Episode 266 - The Threat Actor That Hacked MGM

This week on the podcast, we review a thorough unmasking of Octa Tempest, the threat actor beind the MGM and Caesars Entertainment attacks in September. Before that, we give an update on the Cisco IOS XE vulnerability that head to an implant installed on thousands of exposed devices. We round out the episode with an analysis of CitrixBleed, an information disclosure vulnerability in Citrix NetScaler that was just patched last week.